Quantum cryptography

Results: 548



#Item
271Quantum cryptography / Mathematics / Quantum information science / Applied mathematics / Cryptography / Quantum key distribution / Hamming code / Bit error rate / Forward error correction / Coding theory / Theoretical computer science / Error detection and correction

Quantum Information and Computation, Vol. 15, No. 5&6[removed]–0477 c Rinton Press DEMYSTIFYING THE INFORMATION RECONCILIATION PROTOCOL CASCADE

Add to Reading List

Source URL: gcc.ls.fi.upm.es

Language: English - Date: 2014-11-04 08:25:59
272Electromagnetic radiation / Nanomaterials / Optics / Quantum information science / Quantum cryptography / Quantum dot / Nanotechnology / Photonics / Quantum mechanics / Physics / Emerging technologies / Theoretical computer science

Volume 5, Issue 14 ■ 03APR2015

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2015-04-03 11:46:58
273Key management / Public-key cryptography / Precomputation / Hash tree / Post-quantum cryptography / Digital signature / Quantum digital signature / SHA-2 / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 21:36:12
274Post-quantum cryptography / Cyberwarfare / Applied mathematics / Security / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 08:28:15
275Public-key cryptography / Finite fields / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Goppa code / Linear code / Reed–Solomon error correction / Forward error correction / Cryptography / Coding theory / Error detection and correction

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
276Quantum cryptography / Quantum mechanics / Quantum computer / Photonics / Quantum dot / Nanowire / Quantum information / Nanotechnology / Photon / Physics / Optics / Emerging technologies

Volume 5, Issue 13 ■ 27MAR2015

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2015-03-27 11:53:09
277Quantum information science / Quantum mechanics / Quantum computer / Quantum cryptography / Qubit / Quantum information / Quantum / Quantum machine / Quantum teleportation / Theoretical computer science / Physics / Applied mathematics

Quantum mechanical behaviour at the macroscale

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-16 22:15:51
278Materials science / Computational complexity theory / Information theory / Quantum computer / Quantum cryptography / Nanoelectronics / Reliability engineering / Tata Nano / Theoretical computer science / Applied mathematics / Transport

NANO, QUANTUM AND MOLECULAR COMPUTING: IMPLICATIONS TO HIGH LEVEL DESIGN AND VALIDATION Edited by

Add to Reading List

Source URL: www.cellmatrix.com

Language: English - Date: 2004-11-08 11:47:22
279Quantum cryptography / Quantum measurement / Quantum information theory / Density matrix / Quantum key distribution / Information theory / Qubit / Photon polarization / Introduction to quantum mechanics / Physics / Quantum mechanics / Quantum information science

7 Quantum Communication Technologies 7-1 Quantum detection circuit for quantum channel coding Masahide SASAKI, Jun MIZUNO, and Mikio FUJIWARA Light, main carrier in the present information technology, is electromagnetic

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-20 21:05:39
280Cryptographic protocols / Communication / Quantum complexity theory / Quantum information science / Communication complexity / Computational complexity theory / Communications protocol / Information theory / Alice and Bob / Theoretical computer science / Information / Data

3 Applied Cryptography 3-1 On the Construction of Fast Secure Set-Intersection Protocols NOJIMA Ryo In this paper, we consider a two-party secure set-intersection protocol. In this protocol, there are two parties, a serv

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 20:23:02
UPDATE